Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as session optional pam_motd.so, allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libpam-modules | Canonical | 0.9.7 (including) | 0.9.7 (including) |
Libpam-modules | Canonical | 1.1.1 (including) | 1.1.1 (including) |
Libpam-modules | Canonical | 1.1.2 (including) | 1.1.2 (including) |
Libpam-modules | Canonical | 1.1.3 (including) | 1.1.3 (including) |
Ubuntu_linux | Canonical | 8.04 (including) | 8.04 (including) |
Ubuntu_linux | Canonical | 10.04 (including) | 10.04 (including) |
Ubuntu_linux | Canonical | 10.10 (including) | 10.10 (including) |
Ubuntu_linux | Canonical | 11.04 (including) | 11.04 (including) |
Ubuntu_linux | Canonical | 11.10 (including) | 11.10 (including) |
Pam | Ubuntu | devel | * |
Pam | Ubuntu | lucid | * |
Pam | Ubuntu | maverick | * |
Pam | Ubuntu | natty | * |
Pam | Ubuntu | oneiric | * |